Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Tampa Tech-Security Conference

Date: Thursday, June 27, 2013
Location:

DoubleTree by Hilton Hotel Tampa Airport - Westshore
4500 West Cypress Street
Tampa, FL 33607
p: 813.879.4800

>>click here for directions

Overview

The Tampa Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Bit9

Bobby Lane

FishNet Security, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Check Point Software Technologies Ltd.

Rick Perkins
Channel Manager

What’s Hiding in Your Network?

 

10:30am-11:00am Session Three

Varonis Systems

Christopher Hill

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Gigamon

Martin Langer

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

FireEye, Inc.

Ric Rojas, CISSP
Systems Engineer

Next Generation Threat Protection Against Advance Malware, Zero Day Attacks, and Advanced Persistent Threats (APTs)

The threat landscape has changed. Cybercriminals and nation-states have quickly outpaced older, signature-based technologies. That's why, despite over $20B spent annually on IT security1, over 95% of companies2 harbor advanced malware within their network.
Enterprises must reinforce traditional defenses with next generation threat protection security that detects and blocks these sophisticated, zero day attacks. These new technologies are based on a signature less model that can recognize advanced malware entering through web and email, and thwart attempts by malware to call back to command and control centers. 
This extra defense is designed specifically to fight the unknown threats, such as zero-day and targeted APT attacks, thereby closing the IT security gap that exists in all enterprises. 
1 Gartner, Market Share: Security Software, Worldwide, 2012
2 Based on FireEye end-user data

Ric Rojas, a CISSP from FireEye with over 15 years in the security industry, and experience in malware forensics and intrusion prevention technologies will discuss how a real time signature less security model provides the extra line of defense required  to fight advanced malware, zero-day attacks and targeted APT attacks, thereby closing the IT security gap that exists in most enterprises today. 

>>click here for the presentation

12:45pm-1:30pm Session Six

WatchGuard Technologies, Inc.

Brad Tompkins

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Seven

Axway

Steve Jordan

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

2:15pm-3:00pm Session Eight

Cyber-Ark Software, Ltd.

Aleck B. Brailsford
System Engineers Manager
Mid-Atlantic, Federal and Southeast

Protecting the Privileged: Identity, Security and Privileged Accounts

We will discuss the privileged identity problem and how to resolve it.

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

Centrify Corporation

John Kimberly
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

4:00pm-4:30pm Session Ten

EVault, Inc.

Ryan Gourley

Bill Ferara

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:00pm Session Eleven

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Arista Networks, Inc.
Axway
Bit9
Blue Coat Systems.
Blue Door Networks, LLC
BrightPlanIT Inc.
Celestix Networks, Inc.
Centrify Corporation
Cenzic, Inc.
Check Point Software Technologies Ltd.
Click Security
Cyber-Ark Software, Ltd.
DG Technology Consulting, LLC
ESET, LLC
EVault, Inc.
Event Tracker
Exinda
F5 Networks, Inc.
FireEye, Inc.
FireMon
FishNet Security, Inc.
ForeScout Technologies
Gigamon
Infoblox Inc.
 ISACA West Florida Chapter
 Ixia NVS
Kaspersky Lab
LANDesk Software
Milestone Systems, Inc.
NetClarity, Inc.
Net Optics
Network America
NH&A LLC
paloalto Networks
Promisec
ReliaQuest
Riverbed Technology
SecureAuth
Sims Recycling Solutions
http://www.solutionary.com/
Symplified, Inc
Trend Micro Incorporated
Varonis Systems
WatchGuard Technologies, Inc.
Websense, Inc.
WILDPACKETS, INC
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy